Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Yoshiaki Shiraishi (Kobe Univ.) |
Vice Chair |
|
Takeshi Ueda (Mitsubishi Electric), Hiroki Takakura (NII) |
Secretary |
|
Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT) |
Assistant |
|
Takahiro Kasama (NICT), Akira Yamada (KDDI labs.) |
|
Conference Date |
Wed, Mar 7, 2018 13:00 - 16:30
Thu, Mar 8, 2018 09:20 - 16:05 |
Topics |
Security, Trust, etc. |
Conference Place |
沖縄北部雇用能力開発総合センター |
Address |
〒905-2172 名護市字豊原224-3 |
Transportation Guide |
(バスの場合は77系統「豊原」か「豊原入り口」が最寄りです。) http://www3.jeed.or.jp/okinawa/poly/center.html |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ICSS. |
Wed, Mar 7 PM Network Security 1(A) 13:00 - 14:40 |
(1) ICSS |
13:00-13:25 |
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso ICSS2017-51 |
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) |
(2) ICSS |
13:25-13:50 |
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN ICSS2017-52 |
Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) |
(3) ICSS |
13:50-14:15 |
Malware Detection by Anomaly of Traffic Data for IoT Devices ICSS2017-53 |
Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.) |
(4) ICSS |
14:15-14:40 |
Modeling Worm Propagation using Dynamic Patching ICSS2017-54 |
Sugitani Yuki, Francois Bonnet, Miyaji Atsuko (Osaka Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Wed, Mar 7 PM Cryptography 1 (B) 13:00 - 14:15 |
(5) ICSS |
13:00-13:25 |
On the effectiveness of solving ECDLP using Characteristic set methods ICSS2017-55 |
Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.) |
(6) ICSS |
13:25-13:50 |
Application of Multi-Party Private Set-Intersection ICSS2017-56 |
Motoi Hayashi, Katsunari Shishido, Atsuko Miyaji (Osaka Univ.) |
(7) ICSS |
13:50-14:15 |
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes ICSS2017-57 |
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) |
|
14:15-14:50 |
Break ( 35 min. ) |
Wed, Mar 7 PM Network Security 2(A) 14:50 - 16:30 |
(8) ICSS |
14:50-15:15 |
A study of decentralized IoT Security Controller ICSS2017-58 |
Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) |
(9) ICSS |
15:15-15:40 |
A study of security requirements and function implementation for home networks in a period of IoT expansion ICSS2017-59 |
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) |
(10) ICSS |
15:40-16:05 |
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements ICSS2017-60 |
Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) |
(11) ICSS |
16:05-16:30 |
The spread and the containment of virus in random network model ICSS2017-61 |
Taichi Nishino, Francois Bonnet, Atsuko Miyaji (Osaka Univ.) |
Wed, Mar 7 PM Cryptography 2(B) 14:50 - 16:05 |
(12) ICSS |
14:50-15:15 |
Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion ICSS2017-62 |
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) |
(13) ICSS |
15:15-15:40 |
Evaluation of HIBE based on Universal Sampler ICSS2017-63 |
Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) |
(14) ICSS |
15:40-16:05 |
ICSS2017-64 |
|
Thu, Mar 8 AM Web Security 1(A) 09:20 - 11:00 |
(15) ICSS |
09:20-09:45 |
Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers ICSS2017-65 |
Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research) |
(16) ICSS |
09:45-10:10 |
Automatically Collecting User-initiated Web-based Attacks ICSS2017-66 |
Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) |
(17) ICSS |
10:10-10:35 |
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network ICSS2017-67 |
Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) |
(18) ICSS |
10:35-11:00 |
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning ICSS2017-68 |
Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) |
|
11:00-11:10 |
Break ( 10 min. ) |
Thu, Mar 8 AM Malware(B) 09:20 - 11:00 |
(19) ICSS |
09:20-09:45 |
Considering Opcode-based Similarity between IoT Malware Samples ICSS2017-69 |
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) |
(20) ICSS |
09:45-10:10 |
Evaluation of malware sandbox using evasive test samples |
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(21) ICSS |
10:10-10:35 |
Research on an Evaluation Method for Memory Forensics Tools ICSS2017-70 |
Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC) |
(22) ICSS |
10:35-11:00 |
A Malware Detection Method by Machine Learning Focused on Malignant Activity ICSS2017-71 |
Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) |
|
11:00-11:10 |
Break ( 10 min. ) |
Thu, Mar 8 AM Web Security 2(A) 11:10 - 12:25 |
(23) ICSS |
11:10-11:35 |
Classification for Important Decoy Documents Based on Supervised Learning ICSS2017-72 |
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(24) ICSS |
11:35-12:00 |
Predicting Website Abuse Using Update Histories ICSS2017-73 |
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) |
(25) ICSS |
12:00-12:25 |
Analyzing web application vulnerability reports by machine learning ICSS2017-74 |
Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) |
|
12:25-13:25 |
Lunch Break ( 60 min. ) |
Thu, Mar 8 AM Threat Intelligence(B) 11:10 - 12:00 |
(26) ICSS |
11:10-11:35 |
ICSS2017-75 |
|
(27) ICSS |
11:35-12:00 |
ICSS2017-76 |
|
|
12:00-13:00 |
Lunch Break ( 60 min. ) |
Thu, Mar 8 PM Network Security 3(A) 13:25 - 14:40 |
(28) ICSS |
13:25-13:50 |
Response Signature Generation method for Detecting Malicious Destinations ICSS2017-77 |
Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) |
(29) ICSS |
13:50-14:15 |
Investigation of Inferability of IP addresses for Clients in Organizations ICSS2017-78 |
Miori Saito, Wataru Ueno, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(30) ICSS |
14:15-14:40 |
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification ICSS2017-79 |
Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) |
|
14:40-14:50 |
Break ( 10 min. ) |
Thu, Mar 8 PM SPT/Authentication(B) 13:25 - 15:05 |
(31) |
13:25-13:50 |
(IPSJ-SPT) PINWrite:A New Smartphone Authentication Scheme Using Handwriting Recognition |
(32) |
13:50-14:15 |
|
(33) ICSS |
14:15-14:40 |
A Survey of Factors Influencing Progress of HTTPS Adoption ICSS2017-80 |
Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT) |
(34) ICSS |
14:40-15:05 |
A countermeasure against camrip using the phase modulation ICSS2017-81 |
Toshiki Sasazaki, Tatsuya Mori (Waseda Univ.) |
|
15:05-15:15 |
Break ( 10 min. ) |
Thu, Mar 8 PM Network Security 4(A) 15:15 - 16:05 |
(35) ICSS |
15:15-15:40 |
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data ICSS2017-82 |
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) |
(36) ICSS |
15:40-16:05 |
Analyzing Victims of DRDoS Attacks Observed by Honeypots ICSS2017-83 |
Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
Thu, Mar 8 PM Cryptography 3(B) 15:15 - 16:05 |
(37) ICSS |
15:15-15:40 |
On the Ring Signature Scheme Using LDPC Codes ICSS2017-85 |
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
(38) ICSS |
15:40-16:05 |
On a Method to Implement White-box Cryptography (No Presentation) ICSS2017-84 |
Tomonari Ozeki, Masakazu Soshi (Hiroshima City Univ.) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yoshiaki Shiraishi (Kobe University)
E-: is-adm-q |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
Last modified: 2018-03-07 13:17:00
|